CVE-2025-11730 PUBLISHED

Assigner: Zyxel
Reserved: 14.10.2025 Published: 05.02.2026 Updated: 05.02.2026

A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI command in Zyxel ATP series firmware versions from V5.35 through V5.41, USG FLEX series firmware versions from V5.35 through V5.41, USG FLEX 50(W) series firmware versions from V5.35 through V5.41, and USG20(W)-VPN series firmware versions from V5.35 through V5.41 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device by supplying a specially crafted string as an argument to the CLI command.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 7.2

Product Status

Vendor Zyxel
Product ATP series firmware
Versions Default: unaffected
  • Version versions from V5.35 through V5.41 is affected
Vendor Zyxel
Product USG FLEX series firmware
Versions Default: unaffected
  • Version versions from V5.35 through V5.41 is affected
Vendor Zyxel
Product USG FLEX 50(W) series firmware
Versions Default: unaffected
  • Version versions from V5.35 through V5.41 is affected
Vendor Zyxel
Product USG20(W)-VPN series firmware
Versions Default: unaffected
  • Version versions from V5.35 through V5.41 is affected

References

Problem Types

  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE